88 information-security "https:" "https:" "https:" "https:" "https:" "UCL" scholarships at Nature Careers
Sort by
Refine Your Search
-
Listed
-
Country
-
Program
-
Field
-
requirements, and contribute to the conceptualization, design, and implementation of the Fertility Data and Collaboration Hub (FeDCH) Design and implementation of the legal, data protection and data security
-
The Bundesanstalt für Materialforschung und -prüfung (BAM) is a materials research organization in Germany. Our mission is to ensure safety in technology and chemistry. We perform research and testing in materials
-
Interviews: 23. & 24.03.2026 We invite applicants to undertake their PhD project at one of the five locations of the Helmholtz Centre for Infection Research (HZI). HZI is Germany’s largest academic
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
Area of research: Other Job description: GEOMAR Helmholtz Centre for Ocean Research Kiel is a foundation under public law jointly financed by the Federal Republic of Germany (90%) and the State
-
monthly instalments (increased by a maximum of 50% for previously authorized research stays abroad; the extra funding is provided for no more than 12 months) + research budget (10% of the yearly amount
-
under 30” list. All students are offered 5-year contracts, they receive internationally competitive salaries, and full social security coverage. There is also financial support for students for attending
-
The Department of Mathematics and Computer Science at the University of Southern Denmark (Odense) invites applications for a PhD scholarship in computer science under the umbrella of the Danish
-
, an expert on remotely sensed data, and an expert on processes for triggering enforcement. Projects must articulate a study design for developing, testing, and deploying solutions. Projects that have secured